

Author: Bensted Georgina
Publisher: Routledge Ltd
ISSN: 1469-8404
Source: Information & Communications Technology Law, Vol.21, Iss.3, 2012-10, pp. : 237-256
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
This article provides both an overview and a critique of international counter-terrorist financing measures since 11 September 2001 and their application to tracking terrorist finances generated and channelled via the Internet. Three separate jurisdictions will be studied and compared: the United States, the United Kingdom and the United Nations. In particular, the author examines the effectiveness and appropriateness of certain pieces of international guidance and national counter-terrorist financing legislation, as well as their application and interpretation by governments, courts and law enforcement authorities. By assessing the three main ways of generating terrorist finances via the Internet - direct solicitation of donations, using legitimate sources as a front and cybercrime - the author aims to highlight the strengths and weaknesses of each jurisdiction.
Related content


Semiconductor Science and Technology, Vol. 26, Iss. 1, 2011-01 ,pp. :


Diffusion of News of the Terrorist Attacks of September 11, 2001
By Rogers Everett M. Seidel Nancy
Prometheus, Vol. 20, Iss. 3, 2002-09 ,pp. :






By Cordell P.J. Courtenay J.M. Rudkin S.
BT Technology Journal, Vol. 15, Iss. 4, 1997-10 ,pp. :